Analysis
-
max time kernel
158s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-09-2021 18:17
Static task
static1
Behavioral task
behavioral1
Sample
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe
Resource
win10v20210408
General
-
Target
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe
-
Size
268KB
-
MD5
dd90c8773b2fc0ff28225258fd7b7ead
-
SHA1
d29d57aa279a2dcd026b5d0d79f0def265f08b89
-
SHA256
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849
-
SHA512
536e969d59cfc8b5e5d6a6e103d18f4aebd9dd5152c6e09e832622a10f12443ce1b4cf378bfb75cf22cf9cd692a6f0a65927199b0bacb72adc4c85ac7fcd1ba1
Malware Config
Extracted
smokeloader
2020
http://venerynnet1.top/
http://kevonahira2.top/
http://vegangelist3.top/
http://kingriffaele4.top/
http://arakeishant5.top/
Extracted
redline
installbv
80.85.137.89:17954
Extracted
redline
Moneymaker
185.244.217.166:56316
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3620-134-0x00007FF611180000-0x00007FF6119F8000-memory.dmp family_medusalocker -
Modifies WinLogon for persistence 2 TTPs 6 IoCs
Processes:
ZZZZZ.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\PerfLogs\\powershell.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\PerfLogs\\powershell.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\resources\\ShellExperienceHost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\PerfLogs\\powershell.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\resources\\ShellExperienceHost.exe\", \"C:\\Windows\\Performance\\WinSAT\\DataStore\\VSSVC.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\PerfLogs\\powershell.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\resources\\ShellExperienceHost.exe\", \"C:\\Windows\\Performance\\WinSAT\\DataStore\\VSSVC.exe\", \"C:\\Windows\\System32\\cmmon32\\lsass.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\PerfLogs\\powershell.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\", \"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\resources\\ShellExperienceHost.exe\", \"C:\\Windows\\Performance\\WinSAT\\DataStore\\VSSVC.exe\", \"C:\\Windows\\System32\\cmmon32\\lsass.exe\", \"C:\\odt\\dllhost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\PerfLogs\\powershell.exe\"" ZZZZZ.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4688 3616 schtasks.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 3616 schtasks.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4784 3616 schtasks.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 3616 schtasks.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4848 3616 schtasks.exe 14 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4872 3616 schtasks.exe 14 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/272-179-0x000000000041C5CE-mapping.dmp family_redline behavioral1/memory/272-177-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/4148-194-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/4148-195-0x000000000041C5F6-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid Process 2416 bcdedit.exe 632 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid Process 504 wbadmin.exe 3600 wbadmin.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 12 IoCs
Processes:
99D.exedescription ioc Process File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess 99D.exe File opened for modification C:\Windows\System32\drivers\etc\services 99D.exe File opened for modification C:\Windows\System32\drivers\etc\services.udacha 99D.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 99D.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess 99D.exe File opened for modification C:\Windows\System32\drivers\etc\networks.udacha 99D.exe File opened for modification C:\Windows\System32\drivers\etc\protocol 99D.exe File opened for modification C:\Windows\System32\drivers\etc\services.inprocess 99D.exe File opened for modification C:\Windows\System32\drivers\etc\hosts.udacha 99D.exe File opened for modification C:\Windows\System32\drivers\etc\networks 99D.exe File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess 99D.exe File opened for modification C:\Windows\System32\drivers\etc\protocol.udacha 99D.exe -
Executes dropped EXE 11 IoCs
Processes:
F392.exeF8D3.exe99D.exe174A.exeZZZZZ.exeF392.exeF8D3.exeShellExperienceHost.exe174A.exehddsfighddsfigpid Process 3184 F392.exe 1956 F8D3.exe 3620 99D.exe 2608 174A.exe 264 ZZZZZ.exe 272 F392.exe 4148 F8D3.exe 4408 ShellExperienceHost.exe 4664 174A.exe 1492 hddsfig 4660 hddsfig -
Modifies extensions of user files 29 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
99D.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ConvertToSend.crw.inprocess 99D.exe File renamed C:\Users\Admin\Pictures\DismountSplit.raw.inprocess => C:\Users\Admin\Pictures\DismountSplit.raw.udacha 99D.exe File renamed C:\Users\Admin\Pictures\MergeCompare.tiff.inprocess => C:\Users\Admin\Pictures\MergeCompare.tiff.udacha 99D.exe File renamed C:\Users\Admin\Pictures\RemoveRegister.raw.inprocess => C:\Users\Admin\Pictures\RemoveRegister.raw.udacha 99D.exe File opened for modification C:\Users\Admin\Pictures\ConvertToSend.crw.udacha 99D.exe File renamed C:\Users\Admin\Pictures\DenyReset.tif => C:\Users\Admin\Pictures\DenyReset.tif.inprocess 99D.exe File renamed C:\Users\Admin\Pictures\DenyReset.tif.inprocess => C:\Users\Admin\Pictures\DenyReset.tif.udacha 99D.exe File opened for modification C:\Users\Admin\Pictures\DismountSplit.raw.udacha 99D.exe File opened for modification C:\Users\Admin\Pictures\ExitDebug.crw.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\ExitDebug.crw.udacha 99D.exe File renamed C:\Users\Admin\Pictures\MountDismount.tif.inprocess => C:\Users\Admin\Pictures\MountDismount.tif.udacha 99D.exe File opened for modification C:\Users\Admin\Pictures\RemoveRegister.raw.inprocess 99D.exe File renamed C:\Users\Admin\Pictures\ConvertToSend.crw => C:\Users\Admin\Pictures\ConvertToSend.crw.inprocess 99D.exe File renamed C:\Users\Admin\Pictures\DismountSplit.raw => C:\Users\Admin\Pictures\DismountSplit.raw.inprocess 99D.exe File renamed C:\Users\Admin\Pictures\ExitDebug.crw => C:\Users\Admin\Pictures\ExitDebug.crw.inprocess 99D.exe File renamed C:\Users\Admin\Pictures\MergeCompare.tiff => C:\Users\Admin\Pictures\MergeCompare.tiff.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\MergeCompare.tiff.udacha 99D.exe File renamed C:\Users\Admin\Pictures\MountDismount.tif => C:\Users\Admin\Pictures\MountDismount.tif.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\DenyReset.tif.udacha 99D.exe File renamed C:\Users\Admin\Pictures\ExitDebug.crw.inprocess => C:\Users\Admin\Pictures\ExitDebug.crw.udacha 99D.exe File opened for modification C:\Users\Admin\Pictures\MergeCompare.tiff 99D.exe File opened for modification C:\Users\Admin\Pictures\MergeCompare.tiff.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\MountDismount.tif.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\MountDismount.tif.udacha 99D.exe File renamed C:\Users\Admin\Pictures\ConvertToSend.crw.inprocess => C:\Users\Admin\Pictures\ConvertToSend.crw.udacha 99D.exe File opened for modification C:\Users\Admin\Pictures\DenyReset.tif.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\DismountSplit.raw.inprocess 99D.exe File opened for modification C:\Users\Admin\Pictures\RemoveRegister.raw.udacha 99D.exe File renamed C:\Users\Admin\Pictures\RemoveRegister.raw => C:\Users\Admin\Pictures\RemoveRegister.raw.inprocess 99D.exe -
Deletes itself 1 IoCs
Processes:
pid Process 2180 -
Loads dropped DLL 5 IoCs
Processes:
174A.exepid Process 4664 174A.exe 4664 174A.exe 4664 174A.exe 4664 174A.exe 4664 174A.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 14 IoCs
Processes:
ZZZZZ.exe99D.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\VSSVC = "\"C:\\Windows\\Performance\\WinSAT\\DataStore\\VSSVC.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\VSSVC = "\"C:\\Windows\\Performance\\WinSAT\\DataStore\\VSSVC.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\cmmon32\\lsass.exe\"" ZZZZZ.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run 99D.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\PerfLogs\\powershell.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\odt\\dllhost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\odt\\dllhost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\powershell = "\"C:\\PerfLogs\\powershell.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\resources\\ShellExperienceHost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Windows\\System32\\cmmon32\\lsass.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\99D.exe\" e" 99D.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\ShellExperienceHost\\ShellExperienceHost.exe\"" ZZZZZ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\Windows\\SystemApps\\ShellExperienceHost_cw5n1h2txyewy\\resources\\ShellExperienceHost.exe\"" ZZZZZ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
99D.exedescription ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-1594587808-2047097707-2163810515-1000\desktop.ini 99D.exe -
Enumerates connected drives 3 TTPs 42 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exe99D.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc Process File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\B: 99D.exe File opened (read-only) \??\L: 99D.exe File opened (read-only) \??\P: 99D.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\T: 99D.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\N: 99D.exe File opened (read-only) \??\Y: 99D.exe File opened (read-only) \??\A: 99D.exe File opened (read-only) \??\G: 99D.exe File opened (read-only) \??\I: 99D.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 99D.exe File opened (read-only) \??\D: 99D.exe File opened (read-only) \??\E: 99D.exe File opened (read-only) \??\E: File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\S: 99D.exe File opened (read-only) \??\Z: 99D.exe File opened (read-only) \??\K: 99D.exe File opened (read-only) \??\M: 99D.exe File opened (read-only) \??\Q: 99D.exe File opened (read-only) \??\V: 99D.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\H: 99D.exe File opened (read-only) \??\R: 99D.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\O: 99D.exe File opened (read-only) \??\U: 99D.exe File opened (read-only) \??\X: 99D.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\F: 99D.exe File opened (read-only) \??\J: 99D.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 ip-api.com -
Drops file in System32 directory 64 IoCs
Processes:
99D.exedescription ioc Process File opened for modification C:\Windows\System32\Tasks\VSSVC 99D.exe File opened for modification C:\Windows\System32\config\VSMIDK 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868 99D.exe File opened for modification C:\Windows\System32\Tasks\lsass 99D.exe File opened for modification C:\Windows\System32\config\SECURITY 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess 99D.exe File opened for modification C:\Windows\System32\config\SAM 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.udacha 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9C237ECACBCB4101A3BE740DF0E53F83.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.udacha 99D.exe File opened for modification C:\Windows\System32\config\DRIVERS 99D.exe File opened for modification C:\Windows\System32\config\VSMIDK.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.inprocess 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\62fea884-ba15-4897-9686-808a166505f3.udacha 99D.exe File opened for modification C:\Windows\System32\config\BBI 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\e6a14287-4b32-4edc-ac58-8de04ea6e0eb.udacha 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f55463bc-6f59-4e20-90ee-5964567988a3.udacha 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.udacha 99D.exe File opened for modification C:\Windows\System32\ResPriHMImageList 99D.exe File opened for modification C:\Windows\System32\config\BCD-Template.inprocess 99D.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 4383BB6E4FC67C84.inprocess 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\e6a14287-4b32-4edc-ac58-8de04ea6e0eb 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.udacha 99D.exe File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead.inprocess 99D.exe File opened for modification C:\Windows\System32\ResPriImageList 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07 99D.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.udacha 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.udacha 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506.inprocess 99D.exe File opened for modification C:\Windows\System32\cmmon32\6203df4a6bafc7c328ee7f6f8ca0a8a838a8a1b9.inprocess 99D.exe File opened for modification C:\Windows\System32\Tasks\powershell.inprocess 99D.exe File opened for modification C:\Windows\System32\Tasks\ShellExperienceHost.udacha 99D.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 99D.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess 99D.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6D1A73D92C4DC2751A4B5A2404E1BDCC 99D.exe File opened for modification C:\Windows\System32\config\SOFTWARE 99D.exe File opened for modification C:\Windows\System32\config\RegBack\DEFAULT 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\2adce956-0c74-47e9-8d83-3e951adefd07.udacha 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9C237ECACBCB4101A3BE740DF0E53F83 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.udacha 99D.exe File opened for modification C:\Windows\System32\config\COMPONENTS 99D.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 4383BB6E4FC67C84 99D.exe File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.udacha 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 99D.exe File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.udacha 99D.exe File opened for modification C:\Windows\System32\Tasks\powershell 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\62fea884-ba15-4897-9686-808a166505f3.inprocess 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred 99D.exe File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.udacha 99D.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
F8D3.exepid Process 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe 1956 F8D3.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exeF392.exeF8D3.exe174A.exehddsfigdescription pid Process procid_target PID 1000 set thread context of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 3184 set thread context of 272 3184 F392.exe 120 PID 1956 set thread context of 4148 1956 F8D3.exe 122 PID 2608 set thread context of 4664 2608 174A.exe 146 PID 1492 set thread context of 4660 1492 hddsfig 148 -
Drops file in Program Files directory 49 IoCs
Processes:
99D.exedescription ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess 99D.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess 99D.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 99D.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.udacha 99D.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess 99D.exe File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess 99D.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete 99D.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 99D.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.udacha 99D.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess 99D.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 99D.exe File opened for modification C:\Program Files\Mozilla Firefox\removed-files.udacha 99D.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 99D.exe -
Drops file in Windows directory 64 IoCs
Processes:
99D.exeZZZZZ.exewbadmin.exewbadmin.exedescription ioc Process File opened for modification C:\Windows\Performance\WinSAT\DataStore\59791dedea0f7b368ce35d2c1e2a738d66dd1c8e.udacha 99D.exe File opened for modification C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources\f8c8f1285d826bc63910aaf97db97186ba642b4f 99D.exe File opened for modification C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\f8c8f1285d826bc63910aaf97db97186ba642b4f 99D.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\ShellExperienceHost.exe ZZZZZ.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess 99D.exe File opened for modification C:\Windows\Performance\WinSAT\DataStore\59791dedea0f7b368ce35d2c1e2a738d66dd1c8e.inprocess 99D.exe File opened for modification C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\f8c8f1285d826bc63910aaf97db97186ba642b4f.inprocess 99D.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Panther\setupinfo.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.inprocess 99D.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F}.udacha 99D.exe File opened for modification C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources\f8c8f1285d826bc63910aaf97db97186ba642b4f.udacha 99D.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.udacha 99D.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}.inprocess 99D.exe File opened for modification C:\Windows\Boot\PCAT\bootnxt 99D.exe File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6} 99D.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D 99D.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805.udacha 99D.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{37B8F9C7-03FB-3253-8781-2517C99D7C00}.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97} 99D.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} 99D.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} 99D.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707}.inprocess 99D.exe File opened for modification C:\Windows\Boot\DVD\PCAT\BCD 99D.exe File opened for modification C:\Windows\Installer\SourceHash{12578975-C765-4BDF-8DDC-3284BC0E855F} 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} 99D.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100} 99D.exe File opened for modification C:\Windows\Boot\PCAT\bootmgr 99D.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_cc51e87d-bda7-4ef7-80cf-c431fec6b805.inprocess 99D.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources\f8c8f1285d826bc63910aaf97db97186ba642b4f ZZZZZ.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE} 99D.exe File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707} 99D.exe File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess 99D.exe File opened for modification C:\Windows\Resources\Maps\mwconfig_client 99D.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources\ShellExperienceHost.exe ZZZZZ.exe File opened for modification C:\Windows\Panther\setupinfo.inprocess 99D.exe File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.udacha 99D.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.inprocess 99D.exe File opened for modification C:\Windows\Panther\setupinfo 99D.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{26A24AE4-039D-4CA4-87B4-2F86418066F0} 99D.exe File opened for modification C:\Windows\Boot\DVD\EFI\BCD 99D.exe File opened for modification C:\Windows\Performance\WinSAT\DataStore\59791dedea0f7b368ce35d2c1e2a738d66dd1c8e 99D.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ef8525dacdbd990854d9abd6532181fa\cbshandler\state.udacha 99D.exe File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7} 99D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exehddsfigdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hddsfig Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hddsfig Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI hddsfig -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4848 schtasks.exe 4872 schtasks.exe 4688 schtasks.exe 4720 schtasks.exe 4784 schtasks.exe 4812 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 4600 timeout.exe -
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid Process 3832 vssadmin.exe 1536 vssadmin.exe 3952 vssadmin.exe 1348 vssadmin.exe 3520 vssadmin.exe 2480 vssadmin.exe 3856 vssadmin.exe 3628 vssadmin.exe 2340 vssadmin.exe 1760 vssadmin.exe 3028 vssadmin.exe 3828 vssadmin.exe 800 vssadmin.exe -
Modifies registry class 3 IoCs
Processes:
ZZZZZ.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings ZZZZZ.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exepid Process 580 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 580 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid Process 2180 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exehddsfigpid Process 580 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 4660 hddsfig -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
F392.exevssvc.exeF8D3.exewmic.exepowershell.exepowershell.exepowershell.exeZZZZZ.exedescription pid Process Token: SeShutdownPrivilege 2180 Token: SeCreatePagefilePrivilege 2180 Token: SeShutdownPrivilege 2180 Token: SeCreatePagefilePrivilege 2180 Token: SeShutdownPrivilege 2180 Token: SeCreatePagefilePrivilege 2180 Token: SeShutdownPrivilege 2180 Token: SeCreatePagefilePrivilege 2180 Token: SeDebugPrivilege 3184 F392.exe Token: 33 3184 F392.exe Token: SeIncBasePriorityPrivilege 3184 F392.exe Token: SeShutdownPrivilege 2180 Token: SeCreatePagefilePrivilege 2180 Token: SeShutdownPrivilege 2180 Token: SeCreatePagefilePrivilege 2180 Token: SeBackupPrivilege 1228 vssvc.exe Token: SeRestorePrivilege 1228 vssvc.exe Token: SeAuditPrivilege 1228 vssvc.exe Token: SeDebugPrivilege 1956 F8D3.exe Token: SeIncreaseQuotaPrivilege 4216 wmic.exe Token: SeSecurityPrivilege 4216 wmic.exe Token: SeTakeOwnershipPrivilege 4216 wmic.exe Token: SeLoadDriverPrivilege 4216 wmic.exe Token: SeSystemProfilePrivilege 4216 wmic.exe Token: SeSystemtimePrivilege 4216 wmic.exe Token: SeProfSingleProcessPrivilege 4216 wmic.exe Token: SeIncBasePriorityPrivilege 4216 wmic.exe Token: SeCreatePagefilePrivilege 4216 wmic.exe Token: SeBackupPrivilege 4216 wmic.exe Token: SeRestorePrivilege 4216 wmic.exe Token: SeShutdownPrivilege 4216 wmic.exe Token: SeDebugPrivilege 4216 wmic.exe Token: SeSystemEnvironmentPrivilege 4216 wmic.exe Token: SeRemoteShutdownPrivilege 4216 wmic.exe Token: SeUndockPrivilege 4216 wmic.exe Token: SeManageVolumePrivilege 4216 wmic.exe Token: 33 4216 wmic.exe Token: 34 4216 wmic.exe Token: 35 4216 wmic.exe Token: 36 4216 wmic.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeDebugPrivilege 3920 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeDebugPrivilege 264 ZZZZZ.exe Token: 33 264 ZZZZZ.exe Token: SeIncBasePriorityPrivilege 264 ZZZZZ.exe Token: SeIncreaseQuotaPrivilege 1000 powershell.exe Token: SeSecurityPrivilege 1000 powershell.exe Token: SeTakeOwnershipPrivilege 1000 powershell.exe Token: SeLoadDriverPrivilege 1000 powershell.exe Token: SeSystemProfilePrivilege 1000 powershell.exe Token: SeSystemtimePrivilege 1000 powershell.exe Token: SeProfSingleProcessPrivilege 1000 powershell.exe Token: SeIncBasePriorityPrivilege 1000 powershell.exe Token: SeCreatePagefilePrivilege 1000 powershell.exe Token: SeBackupPrivilege 1000 powershell.exe Token: SeRestorePrivilege 1000 powershell.exe Token: SeShutdownPrivilege 1000 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeSystemEnvironmentPrivilege 1000 powershell.exe Token: SeRemoteShutdownPrivilege 1000 powershell.exe Token: SeUndockPrivilege 1000 powershell.exe Token: SeManageVolumePrivilege 1000 powershell.exe Token: 33 1000 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
pid Process 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 2180 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid Process 2180 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe99D.exe174A.exeF392.exedescription pid Process procid_target PID 1000 wrote to memory of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 1000 wrote to memory of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 1000 wrote to memory of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 1000 wrote to memory of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 1000 wrote to memory of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 1000 wrote to memory of 580 1000 14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe 68 PID 2180 wrote to memory of 3184 2180 71 PID 2180 wrote to memory of 3184 2180 71 PID 2180 wrote to memory of 3184 2180 71 PID 2180 wrote to memory of 1956 2180 72 PID 2180 wrote to memory of 1956 2180 72 PID 2180 wrote to memory of 1956 2180 72 PID 2180 wrote to memory of 3620 2180 75 PID 2180 wrote to memory of 3620 2180 75 PID 2180 wrote to memory of 2608 2180 76 PID 2180 wrote to memory of 2608 2180 76 PID 2180 wrote to memory of 2608 2180 76 PID 3620 wrote to memory of 3028 3620 99D.exe 77 PID 3620 wrote to memory of 3028 3620 99D.exe 77 PID 3620 wrote to memory of 2480 3620 99D.exe 81 PID 3620 wrote to memory of 2480 3620 99D.exe 81 PID 3620 wrote to memory of 3828 3620 99D.exe 83 PID 3620 wrote to memory of 3828 3620 99D.exe 83 PID 3620 wrote to memory of 3856 3620 99D.exe 85 PID 3620 wrote to memory of 3856 3620 99D.exe 85 PID 3620 wrote to memory of 800 3620 99D.exe 87 PID 3620 wrote to memory of 800 3620 99D.exe 87 PID 3620 wrote to memory of 1760 3620 99D.exe 89 PID 3620 wrote to memory of 1760 3620 99D.exe 89 PID 3620 wrote to memory of 3628 3620 99D.exe 91 PID 3620 wrote to memory of 3628 3620 99D.exe 91 PID 3620 wrote to memory of 3832 3620 99D.exe 93 PID 3620 wrote to memory of 3832 3620 99D.exe 93 PID 3620 wrote to memory of 1536 3620 99D.exe 95 PID 3620 wrote to memory of 1536 3620 99D.exe 95 PID 3620 wrote to memory of 3952 3620 99D.exe 97 PID 3620 wrote to memory of 3952 3620 99D.exe 97 PID 3620 wrote to memory of 1348 3620 99D.exe 99 PID 3620 wrote to memory of 1348 3620 99D.exe 99 PID 3620 wrote to memory of 3520 3620 99D.exe 101 PID 3620 wrote to memory of 3520 3620 99D.exe 101 PID 3620 wrote to memory of 2340 3620 99D.exe 103 PID 3620 wrote to memory of 2340 3620 99D.exe 103 PID 3620 wrote to memory of 2416 3620 99D.exe 105 PID 3620 wrote to memory of 2416 3620 99D.exe 105 PID 3620 wrote to memory of 632 3620 99D.exe 107 PID 3620 wrote to memory of 632 3620 99D.exe 107 PID 3620 wrote to memory of 504 3620 99D.exe 109 PID 3620 wrote to memory of 504 3620 99D.exe 109 PID 2608 wrote to memory of 3780 2608 174A.exe 111 PID 2608 wrote to memory of 3780 2608 174A.exe 111 PID 2608 wrote to memory of 3780 2608 174A.exe 111 PID 2608 wrote to memory of 3920 2608 174A.exe 112 PID 2608 wrote to memory of 3920 2608 174A.exe 112 PID 2608 wrote to memory of 3920 2608 174A.exe 112 PID 2608 wrote to memory of 1000 2608 174A.exe 115 PID 2608 wrote to memory of 1000 2608 174A.exe 115 PID 2608 wrote to memory of 1000 2608 174A.exe 115 PID 3184 wrote to memory of 264 3184 F392.exe 117 PID 3184 wrote to memory of 264 3184 F392.exe 117 PID 3620 wrote to memory of 3600 3620 99D.exe 118 PID 3620 wrote to memory of 3600 3620 99D.exe 118 PID 3184 wrote to memory of 272 3184 F392.exe 120 PID 3184 wrote to memory of 272 3184 F392.exe 120 -
System policy modification 1 TTPs 1 IoCs
Processes:
99D.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 99D.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe"C:\Users\Admin\AppData\Local\Temp\14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe"C:\Users\Admin\AppData\Local\Temp\14cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\F392.exeC:\Users\Admin\AppData\Local\Temp\F392.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\ProgramData\ZZZZZ.exe"C:\ProgramData\ZZZZZ.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OotX0aEDLj.bat"3⤵PID:4900
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:5000
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:5056
-
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\ShellExperienceHost.exe"4⤵
- Executes dropped EXE
PID:4408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F392.exe"C:\Users\Admin\AppData\Local\Temp\F392.exe"2⤵
- Executes dropped EXE
PID:272
-
-
C:\Users\Admin\AppData\Local\Temp\F8D3.exeC:\Users\Admin\AppData\Local\Temp\F8D3.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\F8D3.exe"C:\Users\Admin\AppData\Local\Temp\F8D3.exe"2⤵
- Executes dropped EXE
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\99D.exeC:\Users\Admin\AppData\Local\Temp\99D.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3620 -
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:3028
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:2480
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3828
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3856
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:800
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1760
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3628
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3832
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1536
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3952
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1348
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3520
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:2340
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:2416
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:632
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:504
-
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3600
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\99D.exe >> NUL2⤵PID:3924
-
-
C:\Users\Admin\AppData\Local\Temp\174A.exeC:\Users\Admin\AppData\Local\Temp\174A.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com2⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\174A.exeC:\Users\Admin\AppData\Local\Temp\174A.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4664 -
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\174A.exe"3⤵PID:4176
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK4⤵
- Delays execution with timeout.exe
PID:4600
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\PerfLogs\powershell.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4784
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "VSSVC" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\VSSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\System32\cmmon32\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\odt\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4872
-
C:\Users\Admin\AppData\Roaming\hddsfigC:\Users\Admin\AppData\Roaming\hddsfig1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Users\Admin\AppData\Roaming\hddsfigC:\Users\Admin\AppData\Roaming\hddsfig2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ff25cc0046f50b377626dd2bb2f0e0f9
SHA11a005f86eea9f553c4f9c1b19a65a31ca393781f
SHA2562217f393e7e39d1542cc64c3dcdd59f5653bf9a7817f3fa5392271694483a254
SHA512c3dfbf169e23d3fd4ebdbf8a8a42d37e18c7271f68b98ab48d8470c5d8737cfd705ba4e7b64cfd8a2c7b270c34ce6b2de7954a83299744103302db4c30b0b793
-
MD5
a71247a8a35dac0bb05a5d0f863b2948
SHA18308832303ff2968c6813db7c127cbb976b113c5
SHA2563a443ce680f9e02c1ad1e7802c4cb1662e98bcf162487234aae2cb02cb3d9d16
SHA5121bb7f1339b7fc1507942527642d7d1b65084ae78f9df38caf558825bc7e54d8aab952320c29ba55fa663aeef19134e9ce6a5a817ca7309ce314a8b4e39e85aec
-
MD5
a71247a8a35dac0bb05a5d0f863b2948
SHA18308832303ff2968c6813db7c127cbb976b113c5
SHA2563a443ce680f9e02c1ad1e7802c4cb1662e98bcf162487234aae2cb02cb3d9d16
SHA5121bb7f1339b7fc1507942527642d7d1b65084ae78f9df38caf558825bc7e54d8aab952320c29ba55fa663aeef19134e9ce6a5a817ca7309ce314a8b4e39e85aec
-
MD5
d6f3d3ca17bf02d595a877bb35dd4acb
SHA1af325d8a34c8b1fe855eefe617a731bdaf21dcb1
SHA256b1e5516dd59805ff5247fb26bee630ad14073ec1d2e7aa4a98ea6a2c0de0cca8
SHA512d30f3ab293c26e96bb26b925f7992c32cfb5f78d872084541be7f93227bd6867af96dc9c442009ce78b3844e13e2260a8422b46e8aa3f8e1faebae0b258cd89e
-
MD5
6fd55a5291d2bcbcf9802b4c14a5bd72
SHA175f1549c7c7859789ef415fe44e6d2dc61961262
SHA256f0e9c058145bc79fbee033413fd0d2abf3d5580c433f078b73c3954349e9a111
SHA512403540882c995d22639f59b11f756248799e71560ed3a34b6a7f6207d4b2369f64af8da3d605ffc25037357c1ff4f4578bd3501cf5d8e86d68a7102565723546
-
MD5
e71a0a7e48b10bde0a9c54387762f33e
SHA1fed75947f1163b00096e24a46e67d9c21e7eeebd
SHA25683d7be67d0eb544d655cc8e8eb687c26f772d6a40ebf8394e5c12b248976a2de
SHA512394c25daef6143de894505189b1edcdffb82fd6ab9de1c9e43865fb790803ff5c384debfe16236d4a9d95a78d3eea548d3cef332ed5a6881ac9c50d252c3c34a
-
MD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
MD5
c2d06c11dd1f1a8b1dedc1a311ca8cdc
SHA175c07243f9cb80a9c7aed2865f9c5192cc920e7e
SHA25691ac15f1f176f74f02ce89ecdc443d8e33e0064c7bc69a87c7b2da145449d586
SHA512db00860292c3e7430b1534f459c2f0f9778df3a94c51d622dcf1cde390a5539bdc6d60a0d41e6f1ed99a989f17ecb109abd4c17faac4cd398945536f1d0ebb4d
-
MD5
15c4d02979c3d1d1a082977285293d96
SHA1bd1fa4dd41ec4a7b9784d2433ca703503d314855
SHA256f154f0d2c5816d5bd1aaf7cb284ccf647525750a62e97e0d2d8999b682cd9ae7
SHA51242543f9a6b4b56897c64b4e867fa84328e155d483d1cba79ff0cf2613ff0f8069462ea75376b6529d62248ec41edda297c04a0c31f7e84bad38492fba7a49337
-
MD5
85d2668dce79b3171d1c58f844754968
SHA1e36b15b25a4eb39ccad8ad3d90d8e76d6267945f
SHA256680aac8a07551fd4858601aaf420d39938c4f4013022f1fbfc0d0d78d1c79119
SHA512b1cf1c085a4d168a404983846050af22cd5c69df777135a036b0771791494c1b75789ca32942153fd21b947a3f79e79a5589df3d9b668ff80e1fd47653e0190b
-
MD5
85d2668dce79b3171d1c58f844754968
SHA1e36b15b25a4eb39ccad8ad3d90d8e76d6267945f
SHA256680aac8a07551fd4858601aaf420d39938c4f4013022f1fbfc0d0d78d1c79119
SHA512b1cf1c085a4d168a404983846050af22cd5c69df777135a036b0771791494c1b75789ca32942153fd21b947a3f79e79a5589df3d9b668ff80e1fd47653e0190b
-
MD5
22368aed8f943312d0f25fa16b4f158c
SHA1960283457545347bcccf7ab5fc754e656fc616d3
SHA256f17aac5e5e9f26dff8a6b98b67042323874c6e7aa8f558fa60e8aba970d53aa4
SHA5129f2925cc11f49b252c9aa54e667922d0c45f3bcd7823443544953ae8d3cef25f39e71a18720665442384da08e4d18f1e537d59cafd1739507e861cb957581ce8
-
MD5
4b08d4e2ddad506493787f2acf7ffd0a
SHA1cab022b6e4d2baced6a416fe41d65ebdaedf9eb2
SHA2561f7fcedc1d252c439252c78b901aed4cb42ad95774ad0fd6b603ca26f7d2c730
SHA5125a2450455fc7c9e7ef97c37a20d838608d533e1da796ed1f375e61d8154bb14b3323ce3ce9e5161a8bcafda1bd78597c34cbf7bd3098b6f0d321dce73203722f
-
MD5
4b08d4e2ddad506493787f2acf7ffd0a
SHA1cab022b6e4d2baced6a416fe41d65ebdaedf9eb2
SHA2561f7fcedc1d252c439252c78b901aed4cb42ad95774ad0fd6b603ca26f7d2c730
SHA5125a2450455fc7c9e7ef97c37a20d838608d533e1da796ed1f375e61d8154bb14b3323ce3ce9e5161a8bcafda1bd78597c34cbf7bd3098b6f0d321dce73203722f
-
MD5
4b08d4e2ddad506493787f2acf7ffd0a
SHA1cab022b6e4d2baced6a416fe41d65ebdaedf9eb2
SHA2561f7fcedc1d252c439252c78b901aed4cb42ad95774ad0fd6b603ca26f7d2c730
SHA5125a2450455fc7c9e7ef97c37a20d838608d533e1da796ed1f375e61d8154bb14b3323ce3ce9e5161a8bcafda1bd78597c34cbf7bd3098b6f0d321dce73203722f
-
MD5
49fb0e5a3415155c24d6839250cd7fed
SHA169fa4c797df21b98740368c268cfd1919bf4a6e0
SHA256f2a155473c06ecad973676f1e2a8d228ab4a8adf32a87477c716f31fddf6cbaf
SHA5124bcf713b36e0c0bd1e12018cc835a988dbbb2d54556531ebddf97435fd430dab0393fe55e16de5b0c894a49fbea7829f2e6cba5214230f4ee70978a6a87ce397
-
MD5
49fb0e5a3415155c24d6839250cd7fed
SHA169fa4c797df21b98740368c268cfd1919bf4a6e0
SHA256f2a155473c06ecad973676f1e2a8d228ab4a8adf32a87477c716f31fddf6cbaf
SHA5124bcf713b36e0c0bd1e12018cc835a988dbbb2d54556531ebddf97435fd430dab0393fe55e16de5b0c894a49fbea7829f2e6cba5214230f4ee70978a6a87ce397
-
MD5
42754536896295a20426fb22539a30e5
SHA1fa2d664bce5a4a2c54169229ce9be15de37f8944
SHA256ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac
SHA512e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301
-
MD5
42754536896295a20426fb22539a30e5
SHA1fa2d664bce5a4a2c54169229ce9be15de37f8944
SHA256ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac
SHA512e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301
-
MD5
42754536896295a20426fb22539a30e5
SHA1fa2d664bce5a4a2c54169229ce9be15de37f8944
SHA256ba3a717a57750a21b9cca06814f512974af1b5747dbe891cf8bcd0936ca069ac
SHA512e8ce129a25bbd83b932e8549acd0a98b7487ad1298eed46ed80c7e8ecb40bbc09f72fd3526c698f5f1c554b261575ca7e2c33b5f73cc612cd490df3cfcdee301
-
MD5
0f58cab18543b700d55ecf0d490102bb
SHA10f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda
SHA256387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b
SHA5122c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b
-
MD5
0f58cab18543b700d55ecf0d490102bb
SHA10f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda
SHA256387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b
SHA5122c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b
-
MD5
0f58cab18543b700d55ecf0d490102bb
SHA10f52f5ad4b895163d8f7fa5b4f9a9363d4ad8bda
SHA256387643d9542fcbc22a65e2da6b2fe4cba1cb922845503c905f9e93b2c444128b
SHA5122c16418ccca084d62a4002d159dec92839765dd9e6ddb9dcabaebcf60443c24a8ddf17c498e7d20b22526198f2eea6be3a3e1491a07d301403a6f8e109c7cb8b
-
MD5
992d3607f36c435de7878646120c52a0
SHA1202603e7b25929ce656477ce883dd0916cd4c2dd
SHA2561eb0815b0042ed2c3cca168b7768ccadad99eba9232e2a13decd4333207b176f
SHA512b49872dafa16ef259a65d27e212c0c08ff508e1db9f6a7f960aa00abe01165a8feca92ea6066396622e74d156ed0c726af7c3a5ef6e38505e7ef8141681d89da
-
MD5
dd90c8773b2fc0ff28225258fd7b7ead
SHA1d29d57aa279a2dcd026b5d0d79f0def265f08b89
SHA25614cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849
SHA512536e969d59cfc8b5e5d6a6e103d18f4aebd9dd5152c6e09e832622a10f12443ce1b4cf378bfb75cf22cf9cd692a6f0a65927199b0bacb72adc4c85ac7fcd1ba1
-
MD5
dd90c8773b2fc0ff28225258fd7b7ead
SHA1d29d57aa279a2dcd026b5d0d79f0def265f08b89
SHA25614cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849
SHA512536e969d59cfc8b5e5d6a6e103d18f4aebd9dd5152c6e09e832622a10f12443ce1b4cf378bfb75cf22cf9cd692a6f0a65927199b0bacb72adc4c85ac7fcd1ba1
-
MD5
dd90c8773b2fc0ff28225258fd7b7ead
SHA1d29d57aa279a2dcd026b5d0d79f0def265f08b89
SHA25614cc020c9579d2b1ecec2d984dc03a119b8065ef95667dd387b171b0018e9849
SHA512536e969d59cfc8b5e5d6a6e103d18f4aebd9dd5152c6e09e832622a10f12443ce1b4cf378bfb75cf22cf9cd692a6f0a65927199b0bacb72adc4c85ac7fcd1ba1
-
MD5
d57b1571ce23c286abafbc2d4b276942
SHA12d197bf14b1ba92bd9486b3b91fe6a03168a0715
SHA2562b1d01a295bc5f6d466219e78c1bab730761cee343ec349c22cdd8c3b108bee0
SHA51210f591796c45e09a8539330a78820c40e6d8627202173aa6de765926e5adf6b33697c8f8e7a911593e981cf0f29ce72b456ceca04930e26d3125d2e633f3c633
-
MD5
6b5689bb5949f0affef7c913454c73bd
SHA14f95995125ce29176a826684f6a758c709dbcdd4
SHA2562e1dec722f358de66b2f6212cb4d640c3b6d4cec50e469b865355915f640aea4
SHA512907d6caf12deb67b4de0b1dc03667d19228a053fb5ec1c9be516dd1702df11b25850b645d928c0c48589677458192bf76017dd4a1d1f337ba1bf4000566242b8
-
MD5
73dc6b21614040dec225983a36a07385
SHA183b5c7658e01d810f9a65c258a276235ad44e8f5
SHA256bccebb080c4953bdb61688844236b417378c27d15feb6c1aa917720a89a6ac0f
SHA512e59c587034c45f6ba0c0f42719a99f9c478294af490d169f4a2c29c49a4029323f5311fa2710e351b8a5966786e54d2492008c85cf69256fd71f853855c79844
-
MD5
b4af0bab2bdb54e792bf6360661692c2
SHA1f4a61304d08cd513e80506a085ed42561ca923de
SHA256b10031ba76756c0b176ef88eb070ed84e5f21a4eeb0dee450e3a5e4eb49e6f0d
SHA51276923f4c2fa2d89b1a9c60a8ea713926d4dfd67210e5f001931865251f0cc897ce4577615cb13a82bd8a912a7373def0d411b34c4da39902ae2efde520deec4d
-
MD5
71056797cff11fdf296a0557e691299c
SHA198824b3d450552fe7f51cc7f32375a2c4cf02b94
SHA25648dfabde10c7fe9b9c41095a5cac285b48178feaf40867c3e110a261dfe24c52
SHA5127d9a279f4bf25f762ea5255f3263bb4d831dcdf69bcefd151a60e45013b3eec3c135700cff7475270ce45c6a1709c32907984e29e5146b7de89dfe8240ea0cc5
-
MD5
e208a7c0656ef79ee5fc22c004ac8448
SHA198a3d739ee6241760274ee79a1b3be5fa0b755c1
SHA25633550fbfd109e897e7b17f4db9b7c920ed63f685492e2357791b2847ede2d9ab
SHA512a43b4224c7e239ce36852049132cfce4d8c023efbe2520d26ce57983625c623fa1b01829a96525f8af590d292c75e58c938780d407c3c6f70b10dd4e34289a70
-
MD5
f441c38e3aa4a5bbb5684373d7e2799f
SHA1d75d7673ca16b60fcece246a91fc03f8c4ba30af
SHA2567bb2387469e861c1fa84b093d49f588d4a88f7d88edea971260907a2d9c60fec
SHA512beb00b19724c17b7ae09ff79209fd08257e35ef40a50f88de4db30fb783c81289c0d862041127f33d50cd354ed60b69ecd68b57fb0c0f8b74302f9078861d10b
-
MD5
a71247a8a35dac0bb05a5d0f863b2948
SHA18308832303ff2968c6813db7c127cbb976b113c5
SHA2563a443ce680f9e02c1ad1e7802c4cb1662e98bcf162487234aae2cb02cb3d9d16
SHA5121bb7f1339b7fc1507942527642d7d1b65084ae78f9df38caf558825bc7e54d8aab952320c29ba55fa663aeef19134e9ce6a5a817ca7309ce314a8b4e39e85aec
-
MD5
a71247a8a35dac0bb05a5d0f863b2948
SHA18308832303ff2968c6813db7c127cbb976b113c5
SHA2563a443ce680f9e02c1ad1e7802c4cb1662e98bcf162487234aae2cb02cb3d9d16
SHA5121bb7f1339b7fc1507942527642d7d1b65084ae78f9df38caf558825bc7e54d8aab952320c29ba55fa663aeef19134e9ce6a5a817ca7309ce314a8b4e39e85aec
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost\f8c8f1285d826bc63910aaf97db97186ba642b4f
MD54057b791e10353f0ed5a3052fe9a880f
SHA105f46aced8979764820f232ad89f76c869a2928a
SHA256f663665757edd316847f174dabc7c7612640f37f66badeb6811489a0804d05e7
SHA512c91e25d2aab547bb2836678c313ce94b21cbe070097d42ac5e99f3fdda4205c7d8c2efd3bc703746c472de270833e6e50bc694a17bc2f79b9f04b544cae74ad3
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\resources\f8c8f1285d826bc63910aaf97db97186ba642b4f
MD5e74836eba2b435433e56f985bfff5a45
SHA17a8c28462c7391e6b75870c4414efed94f36d29e
SHA256486721c158abaa1aa4baeb95f5bc4f066968d2dd43baa988021749428bfb1467
SHA5129dceae84cca9ce0ac0d6b0919e444aaf34016aa70da8f7c7413bdf79d1f7a6c133fa8cf01f80f0167cc7c510c539f32794facda8db7d010169396b9ff72beb81
-
MD5
31c126019a5ebefd6aa6bae7dde6ee33
SHA194d6c9699aa0576542c3554c5948cce77647071c
SHA2568f6e6f242045cd3ef82a141abaeb04e82be2a7fe7fd84ab5a32cb5e81b19deec
SHA512afbc9a71fc3365ca43d3b47c737070335e11c1a80e7e738de807844511e84a053c9ecf0814371603f556ae70ec18beeee4741a58a5c0f75c08b0fab43a137da3
-
MD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
MD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
MD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
MD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
MD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6